<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse Engineering on nix4cyber</title><link>/cheatsheets/reverse/</link><description>Recent content in Reverse Engineering on nix4cyber</description><generator>Hugo</generator><language>en</language><copyright>Copyright (c) 2025 nix4cyber</copyright><atom:link href="/cheatsheets/reverse/index.xml" rel="self" type="application/rss+xml"/><item><title>Static Analysis</title><link>/cheatsheets/reverse/static-analysis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/reverse/static-analysis/</guid><description>&lt;h2 id="ghidra">Ghidra&lt;/h2>
&lt;p>Ghidra is a GUI tool for reverse engineering software. It provides a comprehensive set of features for analyzing compiled code, including disassembly, decompilation, and debugging.
As Ghidra is a complete tool that brings together many features, we recommend doing CTF challenges to get familiar with it. To do so you can use the following &lt;a href="https://refined-github-html-preview.kidonng.workers.dev/NationalSecurityAgency/ghidra/raw/refs/heads/master/GhidraDocs/CheatSheet.html">Cheat Sheet&lt;/a>.&lt;/p></description></item></channel></rss>